Mitel Product Security Advisory MISA-2024-0029

MiCollab Path Traversal Vulnerability

Advisory ID: MISA-2024-0029

Publish Date: 2024-10-09

Last Updated: 2024-10-09

Revision: 1.0

 

Summary

A path traversal vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab could allow an unauthenticated attacker to conduct a path traversal attack due to insufficient input validation.

A successful exploit of this vulnerability could allow an attacker to gain unauthorized access, with potential impacts to the confidentiality, integrity, and availability of the system.

This vulnerability is exploitable without authentication. If the vulnerability is successfully exploited, an attacker could gain unauthenticated access to provisioning information including non-sensitive user and network information, and perform unauthorized administrative actions on the MiCollab Server.

The vulnerability severity is rated as critical.

Mitel is recommending customers with affected product versions update to the latest release.

Credit is given to Sonny Macdonald of watchTowr for highlighting the issue and bringing it to our attention.

 

Affected Products

This security advisory provides information on the following products:
Product statements are related only to supported product versions. Products which have reached End of Support status are not considered.

 

Vulnerability Severity

The following products have been identified as affected:
The vulnerability severity is rated as critical.

 

Mitigations / Workarounds

Customers with affected product versions should upgrade to the highlighted solution versions or later.
The risk may be mitigated by following the instructions found in the KMS article.

 

Solution/ Recommended Action

This issue is corrected in MiCollab 9.8 SP2 (9.8.2.12). Customers are advised to upgrade to this or subsequent releases.

Please see Mitel Knowledge Base article SO8219, “MiCollab Security Update CVE-2024-41713 - Path Traversal Vulnerability” https://mitel.custhelp.com/app/answers/answer_view/a_id/1021001

If you do not have access to this link, please contact your Mitel Authorized Partner for support.

For further information, please contact Mitel Product Support.

 

Related CVEs / CWEs / Advisories

CVE-2024-41713

 

Revision History

Version Date Description
1.0 2024-10-09 Initial release


The information provided in this advisory is provided "as is" without warranty of any kind. The information is subject to change without notice. Mitel and its affiliates do not guarantee and accept no legal liability whatsoever arising from or connected to the accuracy, reliability, currency or completeness of the information provided. No part of this document can be reproduced or transmitted in any form or by any means - electronic or mechanical - for any purpose without written permission from Mitel Networks Corporation. 
Ready to talk to sales? Contact us.